• Lena@gregtech.eu
      link
      fedilink
      English
      arrow-up
      0
      ·
      19 days ago

      You could intercept their communications and replace the public key one sends with your own, and when the other tries to send a message to the first (to your public key instead of the cat’s) you get access to the message’s contents and then reencrypt it to the correct public key.